Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
5548534
Jul 28, 2022
MIST AI is a WORD Trademark filed on Jul 28, 2022 in TAMIL NADU through United States of America IP Office.The Trademark is registered to JUNIPER NETWORKS, INC. and was filed by DEPENNING & DEPENNING[879].
Application ID
5548534
Status
Registered
Date of Application
Jul 28, 2022
Classes
9, 42
Proprietor(s)
JUNIPER NETWORKS, INC.
Attorney
DEPENNING & DEPENNING[879]
120, VELACHERY MAIN ROAD, GUINDY, CHENNAI - 600 032.
Type
WORD
Registration State
TAMIL NADU
Country
United States of America
Published
Jan 09, 2023
IP Office
CHENNAI
Used Since
Proposed to be used
Valid/Upto
28/07/2032
Details
[Class - 9]
Computer hardware; computer network switches, routers, adapters, and interface devices; wireless access point (WAP) devices; local area network access point devices; gateway routers; wireless communication devices for data, audio, video, or image transmission; computer hardware containing network security functionality, namely, firewalls, data encryption, and interoperability with network security protocols; Downloadable computer software; downloadable operating system software; downloadable operating system software for router and network infrastructure management; downloadable operating system software that hosts computer software applications and facilitates interactions with other computers and peripherals across enterprise networks; downloadable computer networking software; downloadable computer software, namely, downloadable operating system programs for router management services; downloadable computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; downloadable computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of network applications, network programs, computer applications, and computer programs; downloadable computer software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of routers, network switches, wireless networks access points, wired network access points, network infrastructure, computer infrastructure, and data centers; downloadable computer software for managing, operating, designing, implementing, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, tracking, upgrading, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; downloadable computer software for automation, operation, management, and control of operation of computer infrastructure and networking infrastructure; downloadable software for management, control, and operation of computer and networking applications; downloadable computer networking software for the administration, management, and optimization of computer networks; downloadable software for developing and operating cloud computer networks and applications; downloadable computer software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information; downloadable computer software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable computer software for operating, optimizing, configuring, maintaining, monitoring, managing, and deploying software over cloud computing networks; downloadable computer software, namely, downloadable open network application platforms for the development, deployment, testing, configuration, monitoring, and automation of network applications; downloadable computer software for data security and data protection; downloadable computer software for providing security functionality in networks, namely, providing firewall filters, access control, virtual private networks (VPN), interoperability with router security protocols, and protection against network intrusion and viruses; downloadable computer software for computer network security, namely, software for traffic prioritization, secure access control, user identification, encryption, security management, and intrusion prevention; downloadable computer software for monitoring, analyzing or reporting of network information, data and traffic; downloadable artificial intelligence and machine learning software for use in computer network management, monitoring, automation, and troubleshooting; downloadable computer software for interconnecting, monitoring, managing, controlling, analyzing, securing and operating local, wide area, wireless networks, and data centers; downloadable secure access service edge (SASE) software for data and network security; computer hardware and software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of computer networks, local networks, wide-area networks, wired networks, and wireless networks; computer hardware and software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of network applications, network programs, computer applications, and computer programs; computer hardware and software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of routers, network switches, network infrastructure, and computer infrastructure; computer hardware and software for managing, operating, maintaining, controlling, administering, optimizing, developing, deploying, testing, configuring, automating, hosting, navigating, browsing, transferring, distributing, interconnecting, accessing, viewing, monitoring, analyzing, virtualizing, securing, and troubleshooting of cloud computer networks, cloud computing resources, and cloud programs; computer hardware and software for routing, switching, transmitting, processing, filtering, analyzing, securing, uploading, posting, displaying, tagging, editing, organizing, recording, and storing data, video, audio, voice traffic, packets, and information; computer hardware and software for programming local, wide, and global area networks and network infrastructure in mobile devices, televisions, and other video devices; downloadable webcasts, web seminars, case studies, audio files, and videos in the fields of interconnecting, establishing, managing, securing, monitoring, troubleshooting, operating, accessing, and automation of computer hardware, computer software, technology, peripherals, operating systems, local networks, wide-area networks, wired networks, wireless networks, computer networks, network infrastructure, network security, web browsers, electronic devices, cloud computing, and data security for cloud computing environments.